{"title":"Steady Status Study of Distributed Data Caching in Ad Hoc Networks","authors":"J. Taylor, Bin Tang, M. Yildirim","doi":"10.1109/ICCCN.2013.6614197","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614197","url":null,"abstract":"There has been extensive research on distributed data caching in ad hoc networks. However, most of them focus on how to reduce the average delay of requests and improve the packet delivery ratio, not much work has been done to study the steady-state status achieved by the distributed caching algorithms. Information related to steady-state status includes the convergence time of the distributed caching algorithms, the final data replica placement in the network, and the performance comparison of distributed caching algorithms with optimal centralized caching solution. Previous theoretical results show that to minimize the average access cost (or average search cost) in the network, the optimal number of replica of each data object is proportional to the square root (or two-third) of the data's access frequency. In this work, we empirically show that the optimal number of replicas of each data depends on not only the access frequencies of the data, but also the storage capacity of each node. We evaluate the steady-states of both cooperative distributed data caching technique and a selfish caching in ad hoc networks, and compare them to that of the optimal caching solution obtained using integer linear programming (ILP). Via ns2 simulations, we gain some insights about the steady-states of distributed data caching.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114239568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
José Vieira, F. Ganhão, Luís Bernardo, R. Dinis, M. Beko, Rodolfo Oliveira, Paulo Pinto
{"title":"Energy-Efficient QoS Provisioning in Random Access Satellite NDMA Schemes","authors":"José Vieira, F. Ganhão, Luís Bernardo, R. Dinis, M. Beko, Rodolfo Oliveira, Paulo Pinto","doi":"10.1109/ICCCN.2013.6614136","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614136","url":null,"abstract":"Random access approaches in Low Earth Orbit (LEO) satellite networks are usually incompatible with the Quality of Service (QoS) requirements for multimedia traffic, especially when hand-held terminals must operate with a very low signal-to-noise ratio. This paper proposes the Satellite Random Network Diversity Multiple Access (SR-NDMA) protocol that handles multimedia traffic under this context through the combination of a random and scheduled access scheme. The protocol uses a multi-packet receiver, for Single Carrier with Frequency Domain Equalization (SC-FDE) in the uplink, that gradually reduces the packet error rate with additional transmissions. The paper proposes analytical performance models for the throughput, delay and energy efficiency - as long as terminals have finite queues. System parameters are defined to enhance the energy efficiency while satisfying the QoS requirements for limited queue and bit-rate constraints. Results show that the proposed system is energy efficient and provides enough QoS to support multimedia services such as video telephony.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133634518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Landa, R. Clegg, J. Araújo, E. Mykoniati, D. Griffin, M. Rio
{"title":"Measuring the Relationships between Internet Geography and RTT","authors":"R. Landa, R. Clegg, J. Araújo, E. Mykoniati, D. Griffin, M. Rio","doi":"10.1109/ICCCN.2013.6614151","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614151","url":null,"abstract":"When designing distributed systems and Internet protocols, designers can benefit from statistical models of the Internet that can be used to estimate their performance. However, it is frequently impossible for these models to include every property of interest. In these cases, model builders have to select a reduced subset of network properties, and the rest will have to be estimated from those available. In this paper we present a technique for the analysis of Internet round trip times (RTT) and its relationship with other geographic and network properties. This technique is applied on a novel dataset comprising ~19 million RTT measurements derived from ~200 million RTT samples between ~54 thousand DNS servers. Our main contribution is an information-theoretical analysis that allows us to determine the amount of information that a given subset of geographic or network variables (such as RTT or great circle distance between geolocated hosts) gives about other variables of interest. We then provide bounds on the error that can be expected when using statistical estimators for the variables of interest based on subsets of other variables.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115697757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Interference Alignment in Cognitive Radio Networks","authors":"Yi Xu, S. Mao","doi":"10.1109/ICCCN.2013.6614124","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614124","url":null,"abstract":"In this paper, we investigate the problem of incorporating two advanced physical layer technologies, i.e., multiple-input and multiple- output (MIMO) and distributed interference alignment, in cognitive radio (CR) networks. We present a cooperative spectrum leasing scheme for primary and secondary users to trade off between data transmission and revenue collection/payment. A Stackelberg game is formulated, where the primary user is the leader and the secondary users are followers. With backward induction, we derive the unique Stackelberg Equilibrium, where no player can gain by unilaterally changing strategy, as well as the optimal strategies. We find spectrum leasing is always beneficial to enhance the utilities of primary and secondary users. The proposed scheme outperforms a no-spectrum-leasing scheme and a cooperative scheme presented in the literature with considerable gains, which demonstrate the benefits of spectrum leasing and distributed interference alignment and validate the efficacy of the proposed scheme.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Preserving Computations Using Implicit Security","authors":"Abhishek Parakh, W. Mahoney","doi":"10.1109/ICCCN.2013.6614172","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614172","url":null,"abstract":"We present a new technique for privacy preserving computation using an implicit security model that has applications in cloud computing. In the proposed technique, data is divided into partitions and stored over independent cloud servers. When the user wishes to perform computations on the data, he sends a signal to the servers and the servers perform the required computations. We show that if the main data storage servers do not collude, the privacy of the user data is maintained. This can be guaranteed by the use of independent cloud providers. The proposed technique eliminates the requirement of key management, is efficient and practical.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116987260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi Hong, Donghyun Kim, Deying Li, Wenping Chen, A. Tokuta, Zhiming Ding
{"title":"Target-Temporal Effective-Sensing Coverage in Mission-Driven Camera Sensor Networks","authors":"Yi Hong, Donghyun Kim, Deying Li, Wenping Chen, A. Tokuta, Zhiming Ding","doi":"10.1109/ICCCN.2013.6614201","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614201","url":null,"abstract":"This paper introduces two new coverage problems in mission-driven camera sensor networks, namely the target temporal effective-sensing coverage with non-adjustable cameras (TEC-NC) problem and the target-temporal effective-sensing coverage with adjustable cameras (TEC-AC) problem. Given a mission period, the objective of the problems is to find a sleep-wakeup schedule of the camera sensor nodes such that the overall target-temporal coverage is maximized. We formally introduce a method called Identifiability Test to check if a target with a face direction is effectively-covered by a camera sensor, and prove the problems are NP-hard. For TEC-NC, we propose a 2-approximation algorithm and two heuristic algorithms. We also design a greedy strategy which can be combined with our solutions for TEC-NC to solve TEC-AC. The simulation results indicate the quality of the outputs of our algorithms are much better than that of the existing alternative as well as close to the theoretical optimum on average.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunistic Direct Interconnection between Co-Located Wireless Sensor Networks","authors":"Teng Jiang, G. Merrett, N. Harris","doi":"10.1109/ICCCN.2013.6614166","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614166","url":null,"abstract":"Wireless sensor networks are usually designed to avoid interaction with other networks. To share information, they are usually connected via a backbone network (e.g. the Internet) using gateways. The realization of visions for pervasive computing depends upon effective interconnection between individual networks. As the number of deployed sensor networks increases, the chance of any network having multiple neighbors also increases. In this paper, we argue that a paradigm shift towards 'opportunistic direct interconnection' is required. This enables one network to share information or resources with neighboring networks that it was unaware of at design-time. We present OI-MAC, which supports automatic neighbor discovery and cross- boundary data exchange without sacrificing the independence of each network. The effects of discovery and cross-boundary data injection are evaluated using both analytical models and network simulation. Initial results indicate that neighbor discovery has little effect on latency, while energy consumption increases insignificantly compared to ordinary operations of each node. If network traffic is doubled by packets 'injected' from a neighboring network, latency increases by around 7% while average power consumption increases by 20%.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131315298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhuo Liu, Bin Wang, Teng Wang, Yuan Tian, Cong Xu, Yandong Wang, Weikuan Yu, Carlos A. Cruz, Shujia Zhou, T. Clune, S. Klasky
{"title":"Profiling and Improving I/O Performance of a Large-Scale Climate Scientific Application","authors":"Zhuo Liu, Bin Wang, Teng Wang, Yuan Tian, Cong Xu, Yandong Wang, Weikuan Yu, Carlos A. Cruz, Shujia Zhou, T. Clune, S. Klasky","doi":"10.1109/ICCCN.2013.6614174","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614174","url":null,"abstract":"Exascale computing systems are soon to emerge, which will pose great challenges on the huge gap between computing and I/O performance. Many large-scale scientific applications play an important role in our daily life. The huge amounts of data generated by such applications require highly parallel and efficient I/O management policies. In this paper, we adopt a mission-critical scientific application, GEOS-5, as a case to profile and analyze the communication and I/O issues that are preventing applications from fully utilizing the underlying parallel storage systems. Through in-detail architectural and experimental characterization, we observe that current legacy I/O schemes incur significant network communication overheads and are unable to fully parallelize the data access, thus degrading applications' I/O performance and scalability. To address these inefficiencies, we redesign its I/O framework along with a set of parallel I/O techniques to achieve high scalability and performance. Evaluation results on the NASA discover cluster show that our optimization of GEOS- 5 with ADIOS has led to significant performance improvements compared to the original GEOS-5 implementation.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132726053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decoupling Policy from Routing with Software Defined Interdomain Management: Interdomain Routing for SDN-Based Networks","authors":"Peter Thai, J. D. Oliveira","doi":"10.1109/ICCCN.2013.6614121","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614121","url":null,"abstract":"In this paper, we review why BGP is a poor candidate to facilitate the next generation of Software Defined Networks (SDN) and propose the Interdomain Management Layer (IML) architecture, a framework for facilitating interdomain resource sharing between these networks. IML uses a concept we call horizontal slicing, that allows SDN networks to become autonomous peers with other ASes, while maintaining centralized, operator-facing policy control and end-to- end flow control across interdomain boundaries.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126807451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stochastic Pre-Classification for Software Defined Firewalls","authors":"P. Ghoshal, C. Casey, Paul V. Gratz, A. Sprintson","doi":"10.1109/ICCCN.2013.6614198","DOIUrl":"https://doi.org/10.1109/ICCCN.2013.6614198","url":null,"abstract":"Firewalls are ubiquitous security functions and exist in almost all network connected devices whether protecting host stacks or providing transient packet filtering. Firewall performance, which is a key ingredient for network performance, can be greatly degraded by traffic crafted to exploit its filtering algorithms. These attacks can greatly reduce the Quality of Service (QoS) received by existing authorized flows in the firewall. This paper proposes a novel architecture that decouples this linkage between authorized flow QoS and adversarial traffic, marginalizing disruption caused by unauthorized flows, and ultimately improving overall performance of software defined firewalls. We show substantial improvements in throughput, packet loss, and latency over baseline software defined firewalls with varying ratios of attack traffic. All results are obtained using the cycle accurate architecture simulator gem5, and Internet packet traces obtained from 10 Gbps interfaces of core Internet routers.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132230516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}